CVE-2023-48236Integer Overflow or Wraparound in VIM

Severity
4.3MEDIUMNVD
CNA2.8OSV5.5
EPSS
0.0%
top 88.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 16
Latest updateDec 14

Description

Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:LExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

CVEListV5vim/vim< 9.0.2111
NVDvim/vim< 9.0.2111
Debianvim/vim< 2:9.0.2116-1+1
Ubuntuvim/vim< 2:8.1.2269-1ubuntu5.21+4

Also affects: Fedora 37, 38, 39

Patches

🔴Vulnerability Details

3
OSV
vim vulnerabilities2023-12-14
CVEList
overflow in get_number in vim2023-11-16
OSV
CVE-2023-48236: Vim is an open source command line text editor2023-11-16

📋Vendor Advisories

4
Ubuntu
Vim vulnerabilities2023-12-14
Red Hat
vim: overflow in get_number2023-11-16
Microsoft
overflow in get_number in vim2023-11-14
Debian
CVE-2023-48236: vim - Vim is an open source command line text editor. When using the z= command, the u...2023
CVE-2023-48236 — Integer Overflow or Wraparound in VIM | cvebase